SlideShare a Scribd company logo
1 of 27
The way in which a number of computers are connected
together in a network is called topology. It is the physical layout
or arrangement of computers in a network.
There are five basic topologies for connecting computers
in a network.
These are:
1. Bus topology 2.Star topology
3. Ring topology 4. Tree topology
5. Mesh topology
1. Node are connected to a backbone.
2. A special wire called the bus connects node to
backbone.
3. The ends of the bus are closed with
terminators.
4. Bus topology is commonly used for small and
simple networks.
The sending computers attaches the address.
Then data sent to the bus.
only that computer accepts the data whose address
matches.
Only one computer can send data at a time.
1. It is simple and reliable for very small
networks.
2. It is easy to install.
3. It requires minimum length of
communication cable.
4. Time and cost effective.
1. Supports only a small number of
computers.
2. If any fault occurs in the entire network
whole network will be shutdown.
3. Troubleshooting is to difficult to resolve.
• In star topology, all computers or nodes are directly connected
to a central device. The central device that connects the nodes
is called hub.
• Each computer on a star network communicates with the
central hub. The hub then sends data to the destination
computer or computer.
1. It is easy to maintain and modify
network.
2. Adding or removing computers can be
done without disturbing the network.
3. Less cable length is required.
1. Finding of fault is difficult.
2. It is more expensive.
3. If the central hub fails, the whole
network breaks down.
In ring topology, each computer or node is
connected to the next computer and the
last computer is connected to the first.
Thus, a ring of computers is formed.
Every computer receives message from
the previous computer and transmits it
to the next computer till the
destination computer receives the
message.
1.It is less expensive then Star
Topology.
2.Every computer has equal
access to the network.
3.Additional node is easy to add.
1.Failure of one computer can
affect the whole network.
2.It is difficult to troubleshoot.
3.Adding or removing a computer
affects the whole network.
A tree topology combines the
characteristics of bus and star topologies. It
consists of different groups of computers
attached in star topology. The groups are
then connected to a bus backbone cable.
Tree topology is used for the expansion of
an existing network.
1. Point-to-point wiring for individual
segments.
2. Supported by several hardware and
software manufactures.
1. Overall length of each segment is
limited by the type of cabling used.
2. If the backbone breaks down, the
entire network goes down.
3. It is more difficult to configure and
wire than other topologies.
In a mesh network topology, each of the network node,
computer and other devices, are interconnected with one
another. Every node not only sends its own signals but also
relays data from other nodes. In fact a true mesh topology
is the one where every node is connected to every other
node in the network. This type of topology is very
expensive as there are many redundant connections, thus
it is not mostly used in computer networks. It is commonly
used in wireless networks. Flooding or routing technique is
used in mesh topology.
1. The use of dedicated link guarantees
that each connection can carry its
own data load. It eliminates the
traffic problem.
2. If one link becomes unusable, it does
not harm the entire system.
3. It is easy to troubleshoot.
1. A full mesh network can be very
expensive.
2. It is difficult to install and
reconfigure.
3. There are high chances of
redundancy in many of the network
connections.
THEEND

More Related Content

What's hot

Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
Sayyed Nawaz
 

What's hot (20)

Network topologies
Network topologiesNetwork topologies
Network topologies
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
 
Topology
TopologyTopology
Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Class work 10,computer_network_317
Class work 10,computer_network_317Class work 10,computer_network_317
Class work 10,computer_network_317
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking
NetworkingNetworking
Networking
 
Networking notes2
Networking notes2Networking notes2
Networking notes2
 
Topology
TopologyTopology
Topology
 
Cn,3,com net
Cn,3,com netCn,3,com net
Cn,3,com net
 
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
 
Bus topology ppt
Bus topology pptBus topology ppt
Bus topology ppt
 
Presentation on topology
Presentation on topologyPresentation on topology
Presentation on topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Topology And Mesh Topology Group Presentation
Topology And Mesh Topology Group PresentationTopology And Mesh Topology Group Presentation
Topology And Mesh Topology Group Presentation
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
 
Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01Networktopology 130710013533-phpapp01
Networktopology 130710013533-phpapp01
 

Similar to Topology

Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
Ankita Shetty
 

Similar to Topology (20)

Different types of network topologies
Different types of network topologiesDifferent types of network topologies
Different types of network topologies
 
Note -02
Note -02Note -02
Note -02
 
Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Network topologies e business network.pptx
Network topologies e business network.pptxNetwork topologies e business network.pptx
Network topologies e business network.pptx
 
report.pptx
report.pptxreport.pptx
report.pptx
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)
 
Iwt
IwtIwt
Iwt
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Topology
TopologyTopology
Topology
 
Computer Network Topology:( Bus,Star,Ring,Mesh,Tree)
Computer Network Topology:( Bus,Star,Ring,Mesh,Tree)Computer Network Topology:( Bus,Star,Ring,Mesh,Tree)
Computer Network Topology:( Bus,Star,Ring,Mesh,Tree)
 
Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)
 
Topologies
TopologiesTopologies
Topologies
 
Note 2
Note 2Note 2
Note 2
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
Network topology
Network topology Network topology
Network topology
 
Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
Topology
Topology Topology
Topology
 
Network topology
Network topologyNetwork topology
Network topology
 

More from Tayyab Hussain

More from Tayyab Hussain (10)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Ipv6 presention
Ipv6 presentionIpv6 presention
Ipv6 presention
 
Deadlock in database
Deadlock in databaseDeadlock in database
Deadlock in database
 
Introduction to SQL
Introduction to SQLIntroduction to SQL
Introduction to SQL
 
Input devices presentation
Input devices presentationInput devices presentation
Input devices presentation
 
Self discipline
Self disciplineSelf discipline
Self discipline
 
Prejudice and stereotyping
Prejudice and stereotypingPrejudice and stereotyping
Prejudice and stereotyping
 
Newtons law of motion
Newtons law of motionNewtons law of motion
Newtons law of motion
 
Generations of computers
Generations of computersGenerations of computers
Generations of computers
 
Ipv6 presention
Ipv6 presentionIpv6 presention
Ipv6 presention
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Topology

  • 1.
  • 2.
  • 3.
  • 4. The way in which a number of computers are connected together in a network is called topology. It is the physical layout or arrangement of computers in a network. There are five basic topologies for connecting computers in a network. These are: 1. Bus topology 2.Star topology 3. Ring topology 4. Tree topology 5. Mesh topology
  • 5. 1. Node are connected to a backbone. 2. A special wire called the bus connects node to backbone. 3. The ends of the bus are closed with terminators. 4. Bus topology is commonly used for small and simple networks.
  • 6. The sending computers attaches the address. Then data sent to the bus. only that computer accepts the data whose address matches. Only one computer can send data at a time.
  • 7.
  • 8. 1. It is simple and reliable for very small networks. 2. It is easy to install. 3. It requires minimum length of communication cable. 4. Time and cost effective.
  • 9. 1. Supports only a small number of computers. 2. If any fault occurs in the entire network whole network will be shutdown. 3. Troubleshooting is to difficult to resolve.
  • 10. • In star topology, all computers or nodes are directly connected to a central device. The central device that connects the nodes is called hub.
  • 11. • Each computer on a star network communicates with the central hub. The hub then sends data to the destination computer or computer.
  • 12. 1. It is easy to maintain and modify network. 2. Adding or removing computers can be done without disturbing the network. 3. Less cable length is required.
  • 13. 1. Finding of fault is difficult. 2. It is more expensive. 3. If the central hub fails, the whole network breaks down.
  • 14. In ring topology, each computer or node is connected to the next computer and the last computer is connected to the first. Thus, a ring of computers is formed.
  • 15. Every computer receives message from the previous computer and transmits it to the next computer till the destination computer receives the message.
  • 16.
  • 17. 1.It is less expensive then Star Topology. 2.Every computer has equal access to the network. 3.Additional node is easy to add.
  • 18. 1.Failure of one computer can affect the whole network. 2.It is difficult to troubleshoot. 3.Adding or removing a computer affects the whole network.
  • 19. A tree topology combines the characteristics of bus and star topologies. It consists of different groups of computers attached in star topology. The groups are then connected to a bus backbone cable. Tree topology is used for the expansion of an existing network.
  • 20.
  • 21. 1. Point-to-point wiring for individual segments. 2. Supported by several hardware and software manufactures.
  • 22. 1. Overall length of each segment is limited by the type of cabling used. 2. If the backbone breaks down, the entire network goes down. 3. It is more difficult to configure and wire than other topologies.
  • 23. In a mesh network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes. In fact a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks. Flooding or routing technique is used in mesh topology.
  • 24.
  • 25. 1. The use of dedicated link guarantees that each connection can carry its own data load. It eliminates the traffic problem. 2. If one link becomes unusable, it does not harm the entire system. 3. It is easy to troubleshoot.
  • 26. 1. A full mesh network can be very expensive. 2. It is difficult to install and reconfigure. 3. There are high chances of redundancy in many of the network connections.